All that matters security wise is the RIDL attack exists. You then plan how to close the hole. You don't go, I need to win a forum debate about HT. So I will create sophistry about doing nothing. One of the attacks steals your location from your web browser while you at browsing using the Tor network (https://www.torproject.org/). In the right country, that's your life on the line .
Yes you try to understand these attacks and plan - these kind of exploits are serious enough to warrant disabling HT in a shared hosting environment but that isn't why I'm talking about that passwd example - the point is that are even you are slowly admitting in the real world the example they presented has severe obstacles that they haven't gone into details on in the whitepaper - I'm using that as an example that there are also factors like this in their other examples which need to be understood in the light of the security situation with the real world result being that for the average consumer desktop by the time an attacker gets to using these exploits it is already too late and doing things like disabling HT in the appropriate environment doesn't provide adequate security mitigation if your system is compromised enough for them to use these attacks.
BTW Vince is someone who has many many times on these forums demonstrated they have hands on experience with these matters at a level way above the level of the layman with all the proof in posts around these forums so attacking his input by claiming he is a child is pretty LOL.